
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Data augmentation based malware detection using convolutional neural networks
Ferhat Özgür Çatak, Javed Ahmed, Kevser ŞAHİNBAŞ, et al.
PeerJ Computer Science (2021) Vol. 7, pp. e346-e346
Open Access | Times Cited: 63
Ferhat Özgür Çatak, Javed Ahmed, Kevser ŞAHİNBAŞ, et al.
PeerJ Computer Science (2021) Vol. 7, pp. e346-e346
Open Access | Times Cited: 63
Showing 1-25 of 63 citing articles:
Explainable Artificial Intelligence in CyberSecurity: A Survey
Nicola Capuano, Giuseppe Fenza, Vincenzo Loia, et al.
IEEE Access (2022) Vol. 10, pp. 93575-93600
Open Access | Times Cited: 129
Nicola Capuano, Giuseppe Fenza, Vincenzo Loia, et al.
IEEE Access (2022) Vol. 10, pp. 93575-93600
Open Access | Times Cited: 129
A Novel Approach for Network Intrusion Detection Using Multistage Deep Learning Image Recognition
Jevgenijus Toldinas, Algimantas Venčkauskas, Robertas Damaševičius, et al.
Electronics (2021) Vol. 10, Iss. 15, pp. 1854-1854
Open Access | Times Cited: 91
Jevgenijus Toldinas, Algimantas Venčkauskas, Robertas Damaševičius, et al.
Electronics (2021) Vol. 10, Iss. 15, pp. 1854-1854
Open Access | Times Cited: 91
Transfer learning-based convolutional neural network for COVID-19 detection with X-ray images
Kevser ŞAHİNBAŞ, Ferhat Özgür Çatak
Elsevier eBooks (2021), pp. 451-466
Closed Access | Times Cited: 77
Kevser ŞAHİNBAŞ, Ferhat Özgür Çatak
Elsevier eBooks (2021), pp. 451-466
Closed Access | Times Cited: 77
Human, All Too Human? An All-Around Appraisal of the “Artificial Intelligence Revolution” in Medical Imaging
Francesca Coppola, Lorenzo Faggioni, Michela Gabelloni, et al.
Frontiers in Psychology (2021) Vol. 12
Open Access | Times Cited: 75
Francesca Coppola, Lorenzo Faggioni, Michela Gabelloni, et al.
Frontiers in Psychology (2021) Vol. 12
Open Access | Times Cited: 75
A novel malware classification and augmentation model based on convolutional neural network
Adem Tekerek, Muhammed Mutlu Yapıcı
Computers & Security (2021) Vol. 112, pp. 102515-102515
Closed Access | Times Cited: 55
Adem Tekerek, Muhammed Mutlu Yapıcı
Computers & Security (2021) Vol. 112, pp. 102515-102515
Closed Access | Times Cited: 55
Fingerprinting Malware Families Under Uncertainty
Cayden Dunn, Krishnendu Ghosh
IFIP advances in information and communication technology (2025), pp. 167-182
Closed Access
Cayden Dunn, Krishnendu Ghosh
IFIP advances in information and communication technology (2025), pp. 167-182
Closed Access
A Survey on ML Techniques for Multi-Platform Malware Detection: Securing PC, Mobile Devices, IoT, and Cloud Environments
Jannatul Ferdous, Rafiqul Islam, Arash Mahboubi, et al.
Sensors (2025) Vol. 25, Iss. 4, pp. 1153-1153
Open Access
Jannatul Ferdous, Rafiqul Islam, Arash Mahboubi, et al.
Sensors (2025) Vol. 25, Iss. 4, pp. 1153-1153
Open Access
A malware classification method based on directed API call relationships
C. Ma, Zhenwan Li, Haixia Long, et al.
PLoS ONE (2025) Vol. 20, Iss. 3, pp. e0299706-e0299706
Open Access
C. Ma, Zhenwan Li, Haixia Long, et al.
PLoS ONE (2025) Vol. 20, Iss. 3, pp. e0299706-e0299706
Open Access
IIoT Malware Detection Using Edge Computing and Deep Learning for Cybersecurity in Smart Factories
Ho-myung Kim, Kyungho Lee
Applied Sciences (2022) Vol. 12, Iss. 15, pp. 7679-7679
Open Access | Times Cited: 25
Ho-myung Kim, Kyungho Lee
Applied Sciences (2022) Vol. 12, Iss. 15, pp. 7679-7679
Open Access | Times Cited: 25
API2Vec: Learning Representations of API Sequences for Malware Detection
Lei Cui, Jiancong Cui, Yuede Ji, et al.
(2023)
Closed Access | Times Cited: 15
Lei Cui, Jiancong Cui, Yuede Ji, et al.
(2023)
Closed Access | Times Cited: 15
A Survey of Recent Advances in Deep Learning Models for Detecting Malware in Desktop and Mobile Platforms
Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury
ACM Computing Surveys (2023) Vol. 56, Iss. 6, pp. 1-41
Closed Access | Times Cited: 12
Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury
ACM Computing Surveys (2023) Vol. 56, Iss. 6, pp. 1-41
Closed Access | Times Cited: 12
Impact of Neural Network on Malware Detection
Aaeen Alchi, Kiranbhai R. Dodiya, Varayogula Sai Niveditha
Blockchain technologies (2024), pp. 219-241
Closed Access | Times Cited: 4
Aaeen Alchi, Kiranbhai R. Dodiya, Varayogula Sai Niveditha
Blockchain technologies (2024), pp. 219-241
Closed Access | Times Cited: 4
Comparing Deep Learning and Shallow Learning Techniques for API Calls Malware Prediction: A Study
Angelo Cannarile, Vincenzo Dentamaro, Stefano Galantucci, et al.
Applied Sciences (2022) Vol. 12, Iss. 3, pp. 1645-1645
Open Access | Times Cited: 21
Angelo Cannarile, Vincenzo Dentamaro, Stefano Galantucci, et al.
Applied Sciences (2022) Vol. 12, Iss. 3, pp. 1645-1645
Open Access | Times Cited: 21
Secure Multi-party Computation-Based Privacy-Preserving Data Analysis in Healthcare IoT Systems
Kevser ŞAHİNBAŞ, Ferhat Özgür Çatak
Internet of things (2023), pp. 57-72
Closed Access | Times Cited: 11
Kevser ŞAHİNBAŞ, Ferhat Özgür Çatak
Internet of things (2023), pp. 57-72
Closed Access | Times Cited: 11
Streamlining Temporal Formal Verification over Columnar Databases
Giacomo Bergami
Information (2024) Vol. 15, Iss. 1, pp. 34-34
Open Access | Times Cited: 3
Giacomo Bergami
Information (2024) Vol. 15, Iss. 1, pp. 34-34
Open Access | Times Cited: 3
SAGMAD—A Signature Agnostic Malware Detection System Based on Binary Visualisation and Fuzzy Sets
Betty Saridou, Joseph Rose, Stavros Shiaeles, et al.
Electronics (2022) Vol. 11, Iss. 7, pp. 1044-1044
Open Access | Times Cited: 13
Betty Saridou, Joseph Rose, Stavros Shiaeles, et al.
Electronics (2022) Vol. 11, Iss. 7, pp. 1044-1044
Open Access | Times Cited: 13
IMCLNet: A lightweight deep neural network for Image-based Malware Classification
Binghui Zou, Chunjie Cao, Fangjian Tao, et al.
Journal of Information Security and Applications (2022) Vol. 70, pp. 103313-103313
Closed Access | Times Cited: 13
Binghui Zou, Chunjie Cao, Fangjian Tao, et al.
Journal of Information Security and Applications (2022) Vol. 70, pp. 103313-103313
Closed Access | Times Cited: 13
Towards Enhancing Sequence-Optimized Malware Representation With Context-Separated Bi-Directional Long Short-Term Memory and Proximal Policy Optimization
Yuhao Xie, Xiong Luo, Jiankun Sun
IEEE Transactions on Dependable and Secure Computing (2024) Vol. 21, Iss. 5, pp. 4376-4387
Closed Access | Times Cited: 2
Yuhao Xie, Xiong Luo, Jiankun Sun
IEEE Transactions on Dependable and Secure Computing (2024) Vol. 21, Iss. 5, pp. 4376-4387
Closed Access | Times Cited: 2
Entropy-Extreme Model for Predicting the Development of Cyber Epidemics at Early Stages
Viacheslav Kovtun, Krzysztof Grochla, Mohammed Al‐Maitah, et al.
Computational and Structural Biotechnology Journal (2024) Vol. 24, pp. 593-602
Open Access | Times Cited: 2
Viacheslav Kovtun, Krzysztof Grochla, Mohammed Al‐Maitah, et al.
Computational and Structural Biotechnology Journal (2024) Vol. 24, pp. 593-602
Open Access | Times Cited: 2
An Efficient Deep Unsupervised Domain Adaptation for Unknown Malware Detection
Fangwei Wang, Guofang Chai, Qingru Li, et al.
Symmetry (2022) Vol. 14, Iss. 2, pp. 296-296
Open Access | Times Cited: 10
Fangwei Wang, Guofang Chai, Qingru Li, et al.
Symmetry (2022) Vol. 14, Iss. 2, pp. 296-296
Open Access | Times Cited: 10
Specification Mining over Temporal Data
Giacomo Bergami, Samuel Appleby, Graham Morgan
Computers (2023) Vol. 12, Iss. 9, pp. 185-185
Open Access | Times Cited: 5
Giacomo Bergami, Samuel Appleby, Graham Morgan
Computers (2023) Vol. 12, Iss. 9, pp. 185-185
Open Access | Times Cited: 5
TS-Mal: Malware detection model using temporal and structural features learning
Wanyu Li, Hailiang Tang, Hailin Zhu, et al.
Computers & Security (2024) Vol. 140, pp. 103752-103752
Closed Access | Times Cited: 1
Wanyu Li, Hailiang Tang, Hailin Zhu, et al.
Computers & Security (2024) Vol. 140, pp. 103752-103752
Closed Access | Times Cited: 1
Neural Network Innovations in Image-Based Malware Classification: A Comparative Study
Hamzah Al-Qadasi, Djafer Yahia Messaoud Benchadi, Salim Chehida, et al.
Lecture notes on data engineering and communications technologies (2024), pp. 252-265
Closed Access | Times Cited: 1
Hamzah Al-Qadasi, Djafer Yahia Messaoud Benchadi, Salim Chehida, et al.
Lecture notes on data engineering and communications technologies (2024), pp. 252-265
Closed Access | Times Cited: 1
Distinguishing malicious programs based on visualization and hybrid learning algorithms
Sanjeev Kumar, B. Janet
Computer Networks (2021) Vol. 201, pp. 108595-108595
Closed Access | Times Cited: 12
Sanjeev Kumar, B. Janet
Computer Networks (2021) Vol. 201, pp. 108595-108595
Closed Access | Times Cited: 12
MalRed: An innovative approach for detecting malware using the red channel analysis of color images
Syed Shakir Hameed Shah, Norziana Jamil, Atta ur Rehman Khan, et al.
Egyptian Informatics Journal (2024) Vol. 26, pp. 100478-100478
Open Access | Times Cited: 1
Syed Shakir Hameed Shah, Norziana Jamil, Atta ur Rehman Khan, et al.
Egyptian Informatics Journal (2024) Vol. 26, pp. 100478-100478
Open Access | Times Cited: 1